Sciweavers

771 search results - page 135 / 155
» Access Methods and Query Processing Techniques
Sort
View
VLDB
2008
ACM
170views Database» more  VLDB 2008»
14 years 10 months ago
A multi-ranker model for adaptive XML searching
The evolution of computing technology suggests that it has become more feasible to offer access to Web information in a ubiquitous way, through various kinds of interaction device...
Ho Lam Lau, Wilfred Ng
NOMS
2006
IEEE
146views Communications» more  NOMS 2006»
14 years 3 months ago
BGP-Inspect - Extracting Information from Raw BGP Data
— While BGP routing datasets, consisting of raw routing data, are freely available and easy to obtain, extracting any useful information is tedious. Currently, researcher and net...
Dionysus Blazakis, Manish Karir, John S. Baras
CHI
2005
ACM
14 years 10 months ago
When participants do the capturing: the role of media in diary studies
In this paper, we investigate how the choice of media for capture and access affects the diary study method. The diary study is a method of understanding participant behavior and ...
Scott Carter, Jennifer Mankoff
ACSC
2003
IEEE
14 years 3 months ago
Context-Sensitive Mobile Database Summarisation
In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, ...
Darin Chan, John F. Roddick
BMCBI
2010
155views more  BMCBI 2010»
13 years 10 months ago
A flexible R package for nonnegative matrix factorization
Background: Nonnegative Matrix Factorization (NMF) is an unsupervised learning technique that has been applied successfully in several fields, including signal processing, face re...
Renaud Gaujoux, Cathal Seoighe